Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Internet security
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
===Malicious software === Malicious software comes in many forms, such as [[Computer virus|viruses]], [[Trojan horse (computing)|Trojan horses]], [[spyware]], and worms. * [[Malware]], a portmanteau of malicious software, is any software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems. Malware is defined by its malicious intent, acting against the requirements of the computer user, and does not include software that unintentionally causes harm due to some deficiency. The term badware applies to both malware and unintentionally harmful software. * A [[botnet]] is a network of [[zombie computer|computer]]s that have been taken over by a robot or [[Internet bot|bot]] that performs large-scale malicious acts for its creator. * [[Computer viruses]] are programs that can replicate their structures or effects by infecting other files or structures on a computer. The typical purpose of a virus is to take over a computer to steal data. * [[Computer worms]] are programs that can replicate themselves throughout a computer network. * [[Ransomware (malware)|Ransomware]] is a type of malware that restricts access to the computer system that it infects, and demands a ransom in order for the restriction to be removed. * [[Scareware]] is a program of usually limited or no benefit, containing malicious payloads, that is sold via unethical marketing practices. The selling approach uses social engineering to cause shock, anxiety, or the perception of a threat, generally directed at an unsuspecting user. * [[Spyware]] refers to programs that surreptitiously monitor activity on a computer system and report that information to others without the user's consent. * One particular kind of spyware is [[Keystroke logging|key logging]] malware. Often referred to as keylogging or keyboard capturing, is the action of recording (logging) the keys struck on a [[Keyboard (computing)|keyboard]]. * A [[Trojan horse (computing)|Trojan horse]], commonly known as a ''Trojan'', is a general term for malware that pretends to be harmless, so that a user will be convinced to download it onto the computer.
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)